Cryptography Reference
In-Depth Information
for applications such as RFID. The basic idea here is to serialize the data path, i.e.,
one round is processed in several time steps. Good references are [75, 42].
4.8 Lessons Learned
AES is a modern block cipher which supports three key lengths of 128, 192 and
256 bit. It provides excellent long-term security against brute-force attacks.
AES has been studied intensively since the late 1990s and no attacks have been
found that are better than brute-force.
AES is not based on Feistel networks. Its basic operations use Galois field arith-
metic and provide strong diffusion and confusion.
AES is part of numerous open standards such as IPsec or TLS, in addition to
being the mandatory encryption algorithm for US government applications. It
seems likely that the cipher will be the dominant encryption algorithm for many
years to come.
AES is efficient in software and hardware.
Search WWH ::




Custom Search